首页 > 最新文献

2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)最新文献

英文 中文
A study on the increasing in the performance of a solar photovoltaic cell during shading condition 遮阳条件下提高太阳能光伏电池性能的研究
Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530143
Ritesh Dash, S. Swain, P. C. Panda
This paper proposes a special type of converter with solar photovoltaic cell for extracting maximum amount of power from a variable source. The converter topology uses a special characteristics which enables it to extract maximum power from the source. Partial shading is a very critical problem which sometimes leads to permanent damage of the cell. This effect also reduces the system performance and efficiency.
本文提出了一种特殊类型的太阳能光伏电池变换器,用于从可变源中提取最大功率。转换器拓扑结构使用一种特殊的特性,使其能够从源提取最大功率。部分遮阳是一个非常关键的问题,有时会导致细胞的永久性损伤。这种影响也会降低系统的性能和效率。
{"title":"A study on the increasing in the performance of a solar photovoltaic cell during shading condition","authors":"Ritesh Dash, S. Swain, P. C. Panda","doi":"10.1109/ICCPCT.2016.7530143","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530143","url":null,"abstract":"This paper proposes a special type of converter with solar photovoltaic cell for extracting maximum amount of power from a variable source. The converter topology uses a special characteristics which enables it to extract maximum power from the source. Partial shading is a very critical problem which sometimes leads to permanent damage of the cell. This effect also reduces the system performance and efficiency.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal control of islanded microgrid with adaptive fuzzy logic & PI controller using HBCC under various voltage & load variation 基于自适应模糊逻辑和PI控制器的孤岛微电网在不同电压和负载变化下的最优控制
Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530251
S. Choudhury, Abhijeet Choudhury, Deepsikha Panda, P. Rout
This paper presents a robust & astute voltage control avenue for micro grid system operating in autonomous mode. The proposed Adaptive Fuzzy Logic Controller contains two Mamdani based FLC which features in self adjustment of scaling factors, Membership Functions & control gains during uncertainties regardless of any change in the operating conditions. A Hysteresis Band Current Controller (HBCC) has been used which helps in generating the gate pulses for the Voltage Source Converters (VSCs) and also helps in controlling the current instantaneously. The HBCC used in this system limits the device current & gives a faster response irrespective of the controllers & the control outputs used. The proposed controller shows exceptional results as compared to the traditional PI controller. Irrespective of load variation, voltage variation & load unbalance the proposed technique holds good. The transient response time is exclusively reduced, power oscillations are wiped out and faster concurrence is obtained. The uncomplicated design & upgraded dynamic behavior of the A-FLC makes it assuring contestant for Voltage control in autonomous micro grid. Apart from all these disturbances the system was modeled, validated and simulated under the simulation studies in MATLAB environment.
本文提出了一种适用于微电网自主运行的鲁棒灵敏电压控制方法。所提出的自适应模糊控制器包含两个基于Mamdani的FLC,该FLC具有自调整比例因子,隶属函数和不确定状态下的控制增益的特点,无论运行条件如何变化。迟滞带电流控制器(HBCC)用于产生电压源变换器(vsc)的门脉脉冲,也有助于瞬时控制电流。该系统中使用的HBCC限制了设备电流,并且无论使用的控制器和控制输出如何,都能给出更快的响应。与传统的PI控制器相比,所提出的控制器显示出优异的效果。无论负载变化、电压变化和负载不平衡如何,所提出的方法都是有效的。该方法减少了瞬态响应时间,消除了功率振荡,获得了更快的并发。A-FLC的简单设计和升级的动态性能为自主微电网的电压控制提供了保障。除上述干扰外,在MATLAB环境下对系统进行了建模、验证和仿真研究。
{"title":"Optimal control of islanded microgrid with adaptive fuzzy logic & PI controller using HBCC under various voltage & load variation","authors":"S. Choudhury, Abhijeet Choudhury, Deepsikha Panda, P. Rout","doi":"10.1109/ICCPCT.2016.7530251","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530251","url":null,"abstract":"This paper presents a robust & astute voltage control avenue for micro grid system operating in autonomous mode. The proposed Adaptive Fuzzy Logic Controller contains two Mamdani based FLC which features in self adjustment of scaling factors, Membership Functions & control gains during uncertainties regardless of any change in the operating conditions. A Hysteresis Band Current Controller (HBCC) has been used which helps in generating the gate pulses for the Voltage Source Converters (VSCs) and also helps in controlling the current instantaneously. The HBCC used in this system limits the device current & gives a faster response irrespective of the controllers & the control outputs used. The proposed controller shows exceptional results as compared to the traditional PI controller. Irrespective of load variation, voltage variation & load unbalance the proposed technique holds good. The transient response time is exclusively reduced, power oscillations are wiped out and faster concurrence is obtained. The uncomplicated design & upgraded dynamic behavior of the A-FLC makes it assuring contestant for Voltage control in autonomous micro grid. Apart from all these disturbances the system was modeled, validated and simulated under the simulation studies in MATLAB environment.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and analysis of hybrid DC-DC boost converter in continuous conduction mode 连续导通模式下DC-DC混合型升压变换器的设计与分析
Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530166
R. Prasana, S. Ramprasath, N. Vijayasarathi
This paper presents the design and analysis of Hybrid DC-DC Step-up converter in continuous conduction mode (CCM). The proposed Hybrid DC-DC boost converter consists of conventional boost converter which incorporates switched capacitor cell-UP1. It provides high DC-DC voltage conversion(60 V-380 V) and eradicates the complexity in conventional boost converter while operating in high duty ratio. A small structure changes has to be made to convert conventional boost converter into a hybrid switched-cell-based boost converter. There are six different types of switch cells, of all UP1 cell has been used in this converter. The output results are validated with the help of simulation using MATLAB/SIMULINK. The performance, such as dc gain, voltage and current stresses on the actives witch, currents through the inductors are shown in output wave forms.
本文介绍了连续导通模式(CCM)下的混合型DC-DC升压变换器的设计与分析。本文提出的混合型DC-DC升压变换器由传统升压变换器和开关电容单元up1组成。它提供高DC-DC电压转换(60 V-380 V),消除了传统升压转换器的复杂性,同时工作在高占空比下。将传统的升压变换器转换为基于开关电池的混合升压变换器,需要对结构进行微小的改变。有六种不同类型的开关单元,所有UP1单元已用于该转换器。利用MATLAB/SIMULINK对输出结果进行了仿真验证。性能,如直流增益,电压和电流应力的有源开关,电流通过电感器显示在输出波形。
{"title":"Design and analysis of hybrid DC-DC boost converter in continuous conduction mode","authors":"R. Prasana, S. Ramprasath, N. Vijayasarathi","doi":"10.1109/ICCPCT.2016.7530166","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530166","url":null,"abstract":"This paper presents the design and analysis of Hybrid DC-DC Step-up converter in continuous conduction mode (CCM). The proposed Hybrid DC-DC boost converter consists of conventional boost converter which incorporates switched capacitor cell-UP1. It provides high DC-DC voltage conversion(60 V-380 V) and eradicates the complexity in conventional boost converter while operating in high duty ratio. A small structure changes has to be made to convert conventional boost converter into a hybrid switched-cell-based boost converter. There are six different types of switch cells, of all UP1 cell has been used in this converter. The output results are validated with the help of simulation using MATLAB/SIMULINK. The performance, such as dc gain, voltage and current stresses on the actives witch, currents through the inductors are shown in output wave forms.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129925788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel approach to maximize network life time by reducing power consumption level using CGNT model 一种利用CGNT模型通过降低功耗水平来最大化网络寿命的新方法
Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530247
Manas Ranjan Mallick, S. S. Pradhan, Jagamohan Padhi, Seema Panigrahi
A system having an embedded processor which can operate at minimum power with a small memory, where sensor having low data rate, battery, a GPS system and transceiver that operates at low data rate, collectively constitute a wireless device system. The power source in a wireless device system has a fixed value electro motive force (EMF) which is nothing but a battery. The EMF placed to any wireless sensor network is fixed and has deployed at the time of installation. After deployment it is almost difficult to manage and readjust the power source of each component individually in a network. Therefore it is our prime concernto optimize the energy consumption in each node level to have Maximum Network Life Time(MNLT). We have proposed a model name as Complementary Grouping of Network Traffic(CGNT) which gives a better solution for a load balance power aware routing by dissolving theprime uniformly distributed with coalition routing network into two standard group configurations without coalition routing network. The packets are forwarded from source to destination using shortest distance among nodes taking different path for each configuration to balance the power load and to avoid dead node. CGNT model approach consists of two complementary heterogeneous network groups, one which holds the corner nodes named as Corner Complementary Grouping of Network Traffic (CCGNT) and the other which holds the mid nodes named as Mid Complementary Grouping of Network Traffic (MCGNT). Our approach is to follow the motive of power aware routing along with the load balance use of power where individual source to destination node path of total network traffic are carried out differently in two groups, as a result of which the total variance of power level of all nodes in our proposed model CGNT comes up with a satisfactory minimal value, hence that certainly ensures a network's maximized life time as compared to all other existing models.
一种具有可以最小功耗和小存储器运行的嵌入式处理器的系统,其中具有低数据速率的传感器、电池、GPS系统和以低数据速率运行的收发器共同构成无线设备系统。无线设备系统中的电源具有固定值的电动势(EMF),而电动势就是电池。放置到任何无线传感器网络的EMF是固定的,并且在安装时已经部署。部署完成后,对网络中各个部件的电源进行单独管理和调整几乎是一件困难的事情。因此,优化每个节点级别的能量消耗以获得最大的网络生命时间(MNLT)是我们关注的首要问题。我们提出了一种网络流量互补分组(CGNT)模型,该模型将具有联盟路由网络的均匀分布的素数分解为两个没有联盟路由网络的标准组配置,从而更好地解决了负载均衡功率感知路由问题。为了均衡负载,避免死节点,各节点之间采用不同的路径,以最短的距离将报文从源端转发到目的端。CGNT模型方法由两个互补的异构网络组组成,一个包含拐角节点,称为网络流量拐角互补组(CCGNT),另一个包含中间节点,称为网络流量中间互补组(MCGNT)。我们的方法是遵循功率感知路由的动机以及负载平衡使用功率,其中总网络流量的单个源到目标节点路径在两组中进行不同的执行,因此我们提出的模型CGNT中所有节点的功率水平总方差得到了一个令人满意的最小值,因此与所有其他现有模型相比,这当然确保了网络的最大寿命。
{"title":"A novel approach to maximize network life time by reducing power consumption level using CGNT model","authors":"Manas Ranjan Mallick, S. S. Pradhan, Jagamohan Padhi, Seema Panigrahi","doi":"10.1109/ICCPCT.2016.7530247","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530247","url":null,"abstract":"A system having an embedded processor which can operate at minimum power with a small memory, where sensor having low data rate, battery, a GPS system and transceiver that operates at low data rate, collectively constitute a wireless device system. The power source in a wireless device system has a fixed value electro motive force (EMF) which is nothing but a battery. The EMF placed to any wireless sensor network is fixed and has deployed at the time of installation. After deployment it is almost difficult to manage and readjust the power source of each component individually in a network. Therefore it is our prime concernto optimize the energy consumption in each node level to have Maximum Network Life Time(MNLT). We have proposed a model name as Complementary Grouping of Network Traffic(CGNT) which gives a better solution for a load balance power aware routing by dissolving theprime uniformly distributed with coalition routing network into two standard group configurations without coalition routing network. The packets are forwarded from source to destination using shortest distance among nodes taking different path for each configuration to balance the power load and to avoid dead node. CGNT model approach consists of two complementary heterogeneous network groups, one which holds the corner nodes named as Corner Complementary Grouping of Network Traffic (CCGNT) and the other which holds the mid nodes named as Mid Complementary Grouping of Network Traffic (MCGNT). Our approach is to follow the motive of power aware routing along with the load balance use of power where individual source to destination node path of total network traffic are carried out differently in two groups, as a result of which the total variance of power level of all nodes in our proposed model CGNT comes up with a satisfactory minimal value, hence that certainly ensures a network's maximized life time as compared to all other existing models.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"102 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mouse behaviour based multi-factor authentication using neural networks 基于鼠标行为的神经网络多因素认证
Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530312
D. Hema, S. Bhanumathi
Increased usage of multilevel security is noticed along with a rise in vulnerabilities for password based authentication. This is a level III security protection by authentication, which uses handwritten signature using mouse movement. User mouse behavioral pattern based security is a paradigm for online security layers. It uses digital signature to establish authentication with a secure system. The hypothesis is that even if signature verification and respective issuing authorities exists today, their penetration is not felt among a wider audience. To make it affordable and common man, friendly this paper describes user behavior based security. The recorded behavior is transformed as inputs to construct system understandable features. These recordings are carried out in a training system. During the training phase, every position of mouse movement and its curvature is recorded. This data is processed by a data character classifier and provided to an analyzer such that it computes a feature based on distance between points to build a user profile. A secure messaging token mechanism is integrated for multi factor secure authentication. It uses tokenizer cloud service and its mobile app to receive the token.
随着基于密码的身份验证漏洞的增加,多级安全性的使用也在增加。这是一个III级的安全保护,通过身份验证,它使用手写签名使用鼠标移动。基于用户鼠标行为模式的安全是网络安全层的一种范式。它使用数字签名来建立一个安全的系统认证。假设是,即使今天存在签名验证和各自的发行机构,也没有在更广泛的受众中感受到它们的渗透。为了使其经济实惠,通俗友好,本文描述了基于用户行为的安全性。记录的行为被转换为输入,以构建系统可理解的特征。这些录音是在培训系统中进行的。在训练阶段,记录鼠标移动的每个位置及其曲率。该数据由数据字符分类器处理并提供给分析器,使其基于点之间的距离计算特征以构建用户配置文件。集成了安全消息令牌机制,用于多因素安全身份验证。它使用令牌器云服务及其移动应用程序来接收令牌。
{"title":"Mouse behaviour based multi-factor authentication using neural networks","authors":"D. Hema, S. Bhanumathi","doi":"10.1109/ICCPCT.2016.7530312","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530312","url":null,"abstract":"Increased usage of multilevel security is noticed along with a rise in vulnerabilities for password based authentication. This is a level III security protection by authentication, which uses handwritten signature using mouse movement. User mouse behavioral pattern based security is a paradigm for online security layers. It uses digital signature to establish authentication with a secure system. The hypothesis is that even if signature verification and respective issuing authorities exists today, their penetration is not felt among a wider audience. To make it affordable and common man, friendly this paper describes user behavior based security. The recorded behavior is transformed as inputs to construct system understandable features. These recordings are carried out in a training system. During the training phase, every position of mouse movement and its curvature is recorded. This data is processed by a data character classifier and provided to an analyzer such that it computes a feature based on distance between points to build a user profile. A secure messaging token mechanism is integrated for multi factor secure authentication. It uses tokenizer cloud service and its mobile app to receive the token.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132883264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video coding on fast curvelet transform and burrows wheeler transform (Bch) 基于快速曲线变换和burrows wheeler变换的视频编码
Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530364
Mr. Nithin
Due to the improvement in quality of multimedia and video services, peoples are more experienced. Because of bandwidth requirements and resolution problem the designers still search for new robust coding technique. This paper narrates a systematic method for video compression using a new technique: collaboration of fast curvelet transform, burrows wheeler transform and Huffman coding. Modify the number of element in each matrix at the output of fast curvelet transform. Then we apply burrows wheeler and Shannon fano encoding. Burrows wheeler transform BWT is mainly used for compressing any category of data anyhow of its information content. The Huffman coding principle is, compact binary string is used to represent a compressed stream. Huffman codes can be properly reconstructed because no code can be placed before the another code. This technique is used for gray scale as well as color videos.
由于多媒体和视频服务质量的提高,人们有了更多的经验。由于带宽要求和分辨率问题,设计者仍在寻找新的鲁棒编码技术。本文叙述了一种系统的视频压缩方法,该方法采用快速曲线变换、布伦斯-惠勒变换和霍夫曼编码相结合的新技术。修改快速曲线变换输出时每个矩阵中元素的个数。然后应用burrows wheeler和Shannon fano编码。Burrows wheeler变换BWT主要用于压缩任意类别的数据,无论其信息内容如何。霍夫曼编码原理是,用压缩二进制字符串来表示压缩后的流。霍夫曼码可以正确地重建,因为没有代码可以放在另一个代码之前。这种技术用于灰度和彩色视频。
{"title":"Video coding on fast curvelet transform and burrows wheeler transform (Bch)","authors":"Mr. Nithin","doi":"10.1109/ICCPCT.2016.7530364","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530364","url":null,"abstract":"Due to the improvement in quality of multimedia and video services, peoples are more experienced. Because of bandwidth requirements and resolution problem the designers still search for new robust coding technique. This paper narrates a systematic method for video compression using a new technique: collaboration of fast curvelet transform, burrows wheeler transform and Huffman coding. Modify the number of element in each matrix at the output of fast curvelet transform. Then we apply burrows wheeler and Shannon fano encoding. Burrows wheeler transform BWT is mainly used for compressing any category of data anyhow of its information content. The Huffman coding principle is, compact binary string is used to represent a compressed stream. Huffman codes can be properly reconstructed because no code can be placed before the another code. This technique is used for gray scale as well as color videos.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recent survey on efficient trust management in mobile ad hoc networks 移动自组网中高效信任管理的研究进展
Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530315
M. Anugraha, S. Krishnaveni
A Mobile Ad hoc Network is a self-organized network. The nodes which are within its radio range can have a direct communication if not it use an intermediate node for transmitting data. In MANET the nodes are wireless and fully distributed but they do not have any fixed infrastructure like base station or access points. MANET is a dynamic topology that is in this type of network the nodes will move randomly at any location with different speed at unpredictable time, so that the trust relationship is distributed among each node. The trust management is a tricky task; here the trust measures a subjective belief of a node. In a network the trust among nodes are very important for communication. The trust of a node is affected by the selfish and malicious nodes. By measuring some of the parameters like connectivity, energy, unselfishness and healthiness the malicious and the selfish nodes are predicted. In this network the secure routing is performed by the development of trust management protocols which yields the minimization of trust bias and it maximizes the application performance. This paper surveys different trust based protocols which obtains the trusted routing in malicious and selfish affected nodes.
移动自组织网络是一种自组织网络。如果不使用中间节点传输数据,则在其无线电范围内的节点可以直接通信。在MANET中,节点是无线和完全分布的,但它们没有任何固定的基础设施,如基站或接入点。MANET是一种动态拓扑结构,在这种类型的网络中,节点会在不可预测的时间以不同的速度在任意位置随机移动,从而使信任关系分布在每个节点之间。信任管理是一项棘手的任务;这里的信任衡量的是节点的主观信念。在网络中,节点间的信任对通信至关重要。节点的信任会受到自私和恶意节点的影响。通过测量连接、能量、无私和健康等参数,预测出恶意节点和自私节点。在该网络中,通过开发信任管理协议来实现安全路由,使信任偏差最小化,使应用性能最大化。研究了不同的基于信任的协议,得到了受恶意和自私影响节点的可信路由。
{"title":"Recent survey on efficient trust management in mobile ad hoc networks","authors":"M. Anugraha, S. Krishnaveni","doi":"10.1109/ICCPCT.2016.7530315","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530315","url":null,"abstract":"A Mobile Ad hoc Network is a self-organized network. The nodes which are within its radio range can have a direct communication if not it use an intermediate node for transmitting data. In MANET the nodes are wireless and fully distributed but they do not have any fixed infrastructure like base station or access points. MANET is a dynamic topology that is in this type of network the nodes will move randomly at any location with different speed at unpredictable time, so that the trust relationship is distributed among each node. The trust management is a tricky task; here the trust measures a subjective belief of a node. In a network the trust among nodes are very important for communication. The trust of a node is affected by the selfish and malicious nodes. By measuring some of the parameters like connectivity, energy, unselfishness and healthiness the malicious and the selfish nodes are predicted. In this network the secure routing is performed by the development of trust management protocols which yields the minimization of trust bias and it maximizes the application performance. This paper surveys different trust based protocols which obtains the trusted routing in malicious and selfish affected nodes.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comprehensive study on machine learning concepts for text mining 文本挖掘中机器学习概念的综合研究
Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530259
K. Surya, R. Nithin, S. Prasanna, R. Venkatesan
The aim of machine learning is to solve a given problem using past experience or example data. Many machine learning applications are using now-a-days already. More aspiring problems can be handled as more data become accessible. Here. in this context we learn in detail about text mining as a multi-dimensional field which involves the closely linked areas or sections like 1. Retrieving information, 2. Machine learning concepts shortly termed as ML, 3. Statistics, 4. And finally Computational linguistics and specifically to be mentioned, data mining. With the use of sample data or previously gained experience, machine learning is included into computers to enhance or improve a performance decisive factor. In this context we have detailed a model up to some level of constraints, and learning is the processing of a main content to enhance the parameter of the form using the training or sample data or previously gained experience. This may be designed to gain knowledge from the given data, or use the effect for changes in the future, or both. These learning techniques also helps us to make solutions to various bugs which includes vision, speech recognition, and robotics. We take the example of the main analysis of preprocessing of tasks and procedures, then classification, then clustering, information extraction and finally visualization.
机器学习的目的是利用过去的经验或示例数据来解决给定的问题。许多机器学习应用现在已经在使用了。随着更多的数据变得可访问,更多有抱负的问题可以得到处理。在这里。在这种情况下,我们将详细了解文本挖掘作为一个多维领域,它涉及密切相关的区域或部分,如1。检索信息;机器学习概念,简称ML, 3。统计,4。最后是计算语言学,特别要提一下,数据挖掘。通过使用样本数据或先前获得的经验,机器学习被纳入计算机以增强或改善性能决定性因素。在这种情况下,我们已经详细说明了一个模型到某种程度的约束,学习是处理的一个主要内容,以增强参数的形式使用训练或样本数据或以前获得的经验。这可能是为了从给定的数据中获得知识,或者利用未来变化的影响,或者两者兼而有之。这些学习技术也帮助我们解决各种错误,包括视觉、语音识别和机器人。我们以任务和程序的预处理为例,主要分析了分类、聚类、信息提取和可视化。
{"title":"A comprehensive study on machine learning concepts for text mining","authors":"K. Surya, R. Nithin, S. Prasanna, R. Venkatesan","doi":"10.1109/ICCPCT.2016.7530259","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530259","url":null,"abstract":"The aim of machine learning is to solve a given problem using past experience or example data. Many machine learning applications are using now-a-days already. More aspiring problems can be handled as more data become accessible. Here. in this context we learn in detail about text mining as a multi-dimensional field which involves the closely linked areas or sections like 1. Retrieving information, 2. Machine learning concepts shortly termed as ML, 3. Statistics, 4. And finally Computational linguistics and specifically to be mentioned, data mining. With the use of sample data or previously gained experience, machine learning is included into computers to enhance or improve a performance decisive factor. In this context we have detailed a model up to some level of constraints, and learning is the processing of a main content to enhance the parameter of the form using the training or sample data or previously gained experience. This may be designed to gain knowledge from the given data, or use the effect for changes in the future, or both. These learning techniques also helps us to make solutions to various bugs which includes vision, speech recognition, and robotics. We take the example of the main analysis of preprocessing of tasks and procedures, then classification, then clustering, information extraction and finally visualization.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sensorless brushless DC motor drive fed by Cuk converter 无传感器无刷直流电动机由Cuk变换器驱动
Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530108
Merin Jacob, Aishwarya V
This paper deals with sensorless brushless DC motor drive fed by a Cuk converter as a cost-effective solution for low-power applications. The single phase supply is fed to uncontrolled bridge rectifier, which is followed by a Cuk converter used to control the voltage of DC link capacitor that feds the Voltage Source Inverter (VSI). Voltage of the DC link capacitor of Cuk converter is controlled to achieve the speed control of BLDC motor. The rotor position sensors are eliminated by using sensorless control. Electronic commutation of the VSI is done by detecting the zero crossing points (ZCP) of the back EMF voltage difference in order to avoid phase delay circuits. A mathematical model of the drive system is simulated with MATLAB/SIMULINK.
本文讨论了由Cuk变换器驱动的无传感器无刷直流电动机作为低功耗应用的一种经济有效的解决方案。单相电源被馈送到非受控桥式整流器,然后是一个Cuk变换器,用于控制直流链路电容的电压,该电容与电压源逆变器(VSI)相连。通过控制Cuk变换器直流链路电容的电压,实现无刷直流电机的调速。采用无传感器控制消除了转子位置传感器。VSI的电子换相是通过检测反电动势电压差的零交叉点(ZCP)来完成的,以避免相位延迟电路。利用MATLAB/SIMULINK对驱动系统的数学模型进行了仿真。
{"title":"Sensorless brushless DC motor drive fed by Cuk converter","authors":"Merin Jacob, Aishwarya V","doi":"10.1109/ICCPCT.2016.7530108","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530108","url":null,"abstract":"This paper deals with sensorless brushless DC motor drive fed by a Cuk converter as a cost-effective solution for low-power applications. The single phase supply is fed to uncontrolled bridge rectifier, which is followed by a Cuk converter used to control the voltage of DC link capacitor that feds the Voltage Source Inverter (VSI). Voltage of the DC link capacitor of Cuk converter is controlled to achieve the speed control of BLDC motor. The rotor position sensors are eliminated by using sensorless control. Electronic commutation of the VSI is done by detecting the zero crossing points (ZCP) of the back EMF voltage difference in order to avoid phase delay circuits. A mathematical model of the drive system is simulated with MATLAB/SIMULINK.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Auction based dynamic resource allocation in cloud 基于拍卖的云计算动态资源分配
Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530347
E. I. Nehru, J. Infant Smile Shyni, R. Balakrishnan
Cloud computing is one of the fastest emerging technology. As we all know, cloud is a wide pool of resource which provides resources based on the users request. Any service can be provided as a service through cloud. As the cloud contains many resources, there may also wastage of resources. To reduce this wastage, cloud providers enter into auctioning of resources when the demand is high. Cloud computing includes distinct resources. Because of the complementary and supplementary effects between distinct assets, bidders have preferences not for just a single resource but also for a set of resources. Auctioning for a bundle of resources is called combinatorial auction. Dynamic resource allocation in on demand for a bundle of resource is proposed by using CA - PROVISION algorithm and the scenarios are simulated using Cloudsim, a simulator meant for cloud computing analysis.
云计算是发展最快的新兴技术之一。众所周知,云是一个广泛的资源池,它根据用户的请求提供资源。任何服务都可以通过云作为服务提供。由于云包含了大量的资源,也有可能造成资源的浪费。为了减少这种浪费,云提供商在需求高的时候进行资源拍卖。云计算包括不同的资源。由于不同资产之间的互补和补充效应,投标人不仅对单一资源有偏好,而且对一组资源也有偏好。对一堆资源的拍卖称为组合拍卖。利用CA - PROVISION算法提出了一组资源按需动态分配的方法,并利用Cloudsim模拟了这些场景。
{"title":"Auction based dynamic resource allocation in cloud","authors":"E. I. Nehru, J. Infant Smile Shyni, R. Balakrishnan","doi":"10.1109/ICCPCT.2016.7530347","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530347","url":null,"abstract":"Cloud computing is one of the fastest emerging technology. As we all know, cloud is a wide pool of resource which provides resources based on the users request. Any service can be provided as a service through cloud. As the cloud contains many resources, there may also wastage of resources. To reduce this wastage, cloud providers enter into auctioning of resources when the demand is high. Cloud computing includes distinct resources. Because of the complementary and supplementary effects between distinct assets, bidders have preferences not for just a single resource but also for a set of resources. Auctioning for a bundle of resources is called combinatorial auction. Dynamic resource allocation in on demand for a bundle of resource is proposed by using CA - PROVISION algorithm and the scenarios are simulated using Cloudsim, a simulator meant for cloud computing analysis.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1